메뉴 건너뛰기




Volumn 5086 LNCS, Issue , 2008, Pages 189-206

Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on HMAC/NMAC-3-pass HAVAL

Author keywords

HAVAL; HMAC; Key recovery attack; NMAC; Second preimage attack

Indexed keywords

HAVAL; HMAC; KEY RECOVERY ATTACK; KEY-RECOVERY; NMAC; PREIMAGE ATTACK; SECOND PREIMAGE ATTACK;

EID: 50249137694     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-71039-4_12     Document Type: Conference Paper
Times cited : (14)

References (19)
  • 1
    • 35048892549 scopus 로고    scopus 로고
    • Near-Collisions of SHA-0
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Biham, E., Chen, R.: Near-Collisions of SHA-0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 290-305. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 290-305
    • Biham, E.1    Chen, R.2
  • 2
    • 50249125503 scopus 로고    scopus 로고
    • Biham, E., Chen, R., Joux, A., Carribault, P., Lemuet, C., Jalby, W.: Collisions of SHA-0 and Reduced SHA-1. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, 3494, pp. 22-35. Springer, Heidelberg (2005)
    • Biham, E., Chen, R., Joux, A., Carribault, P., Lemuet, C., Jalby, W.: Collisions of SHA-0 and Reduced SHA-1. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 22-35. Springer, Heidelberg (2005)
  • 3
    • 84985796089 scopus 로고    scopus 로고
    • Boer, B.D., Bosselaers, A.: Collisions for the Compression Function of MD-5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, 765, pp. 293-304. Springer, Heidelberg (1994)
    • Boer, B.D., Bosselaers, A.: Collisions for the Compression Function of MD-5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 293-304. Springer, Heidelberg (1994)
  • 4
    • 77649243367 scopus 로고    scopus 로고
    • Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Contini, S., Yin, Y.L.: Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 37-53. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 37-53
    • Contini, S.1    Yin, Y.L.2
  • 5
    • 84958953847 scopus 로고    scopus 로고
    • Dobbertin, H.: Cryptanalsis of MD4. In: Gollmann, D. (ed.) FSE 1996. LNCS, 1039, pp. 53-69. Springer, Heidelberg (1996)
    • Dobbertin, H.: Cryptanalsis of MD4. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 53-69. Springer, Heidelberg (1996)
  • 6
    • 38149058225 scopus 로고    scopus 로고
    • Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Fouque, P.A., Leurent, G., Nguyen, P.Q.: Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 13-30. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 13-30
    • Fouque, P.A.1    Leurent, G.2    Nguyen, P.Q.3
  • 7
    • 33750029023 scopus 로고    scopus 로고
    • Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 242-256. Springer, Heidelberg (2006)
    • Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 242-256. Springer, Heidelberg (2006)
  • 8
    • 38549124309 scopus 로고    scopus 로고
    • On Authentication With HMAC and Non-Rondom Properties
    • Dietrich, S, Dhamija, R, eds, FC 2007 and USEC 2007, Springer, Heidelberg
    • Rechberger, C., Rijmen, V.: On Authentication With HMAC and Non-Rondom Properties. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 119-133. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4886 , pp. 119-133
    • Rechberger, C.1    Rijmen, V.2
  • 9
    • 0345490612 scopus 로고    scopus 로고
    • Cryptanalysis of 3-pass HAVAL
    • Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
    • Van Rompay, B., Biryukov, A., Preneel, B., Vandewalle, J.: Cryptanalysis of 3-pass HAVAL. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 228-245. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2894 , pp. 228-245
    • Van Rompay, B.1    Biryukov, A.2    Preneel, B.3    Vandewalle, J.4
  • 10
    • 19944425657 scopus 로고    scopus 로고
    • Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, Cryptology ePrint Archive
    • Report 2004/199
    • Wang, X., Feng, D., Lai, X., Yu, H.: Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, Cryptology ePrint Archive, Report 2004/199 (2007)
    • (2007)
    • Wang, X.1    Feng, D.2    Lai, X.3    Yu, H.4
  • 11
    • 26444573353 scopus 로고    scopus 로고
    • The Collision Attack on Hash Function HAVAL-128
    • Wang, X., Feng, D., Yu, H.: The Collision Attack on Hash Function HAVAL-128. Science in China, Series E 35(4), 405-416 (2005)
    • (2005) Science in China, Series E , vol.35 , Issue.4 , pp. 405-416
    • Wang, X.1    Feng, D.2    Yu, H.3
  • 12
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the Hash Functions MD4 and RIPEMD
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the Hash Functions MD4 and RIPEMD. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1-18. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 13
    • 50249109655 scopus 로고    scopus 로고
    • Wang, X., Yin, X.Y., Yu, H.: Finding Collision in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
    • Wang, X., Yin, X.Y., Yu, H.: Finding Collision in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
  • 14
    • 33745122987 scopus 로고    scopus 로고
    • Efficient Collision Search Attacks on SHA-0
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Wang, X., Yu, H., Yin, X.Y.: Efficient Collision Search Attacks on SHA-0. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 1-16. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 1-16
    • Wang, X.1    Yu, H.2    Yin, X.Y.3
  • 15
    • 24944591357 scopus 로고    scopus 로고
    • How to Break MD5 and Other Hash Functions
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 17
    • 33746695391 scopus 로고    scopus 로고
    • Yu, H., Wang, X., Yun, A., Park, S.: Cryptanalysis of the Full HAVAL with 4 and 5 Passes. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, 4047, pp. 89-110. Springer, Heidelberg (2006)
    • Yu, H., Wang, X., Yun, A., Park, S.: Cryptanalysis of the Full HAVAL with 4 and 5 Passes. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 89-110. Springer, Heidelberg (2006)
  • 18
    • 33744827107 scopus 로고    scopus 로고
    • Yu, H., Wang, G., Zhang, G., Wang, X.: The Second-Preimage Attack on MD4. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, 3810, pp. 1-12. Springer, Heidelberg (2005)
    • Yu, H., Wang, G., Zhang, G., Wang, X.: The Second-Preimage Attack on MD4. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 1-12. Springer, Heidelberg (2005)
  • 19
    • 84985796228 scopus 로고
    • HAVAL - a one-way hashing algorithm with variable length of output
    • Zheng, Y, Seberry, J, eds, AUSCRYPT 1992, Springer, Heidelberg
    • Zheng, Y., Pieprzyk, J., Seberry, J.: HAVAL - a one-way hashing algorithm with variable length of output. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 83-104. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.718 , pp. 83-104
    • Zheng, Y.1    Pieprzyk, J.2    Seberry, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.